welcome to the performance driven academy we will begin
play

Welcome to the Performance Driven Academy! We will begin the - PowerPoint PPT Presentation

Welcome to the Performance Driven Academy! We will begin the webinar shortly. If you havent already done so, please complete the End Semester 1/Midpoint Survey (link in chat box). Everyone should complete this individually. If you viewed


  1. Welcome to the Performance Driven Academy! We will begin the webinar shortly. If you haven’t already done so, please complete the End Semester 1/Midpoint Survey (link in chat box). Everyone should complete this individually. If you viewed the previous webinar, also take the 3 question Webinar Feedback Survey. Questions? Email us at pda@ccsi.org

  2. Performance Driven Bar graph Academy SESSION 7: ASSESSING CORPORATE COMPLIANCE, HIPAA PRIVACY AND SECURITY

  3. Brought to you by the Managed Care Technical Assistance Center Speaking: Briannon O’Connor, PhD Associate Director CCSI’s Center for Collaboration in Community Health

  4. Reminders ‣ Links to the End of Semester 1/Midpoint evaluation were sent out • Takes about 10 minutes • You’ll receive a report summarizing results • Each individual should complete it ‣ Webinars are recorded and you should have received materials ahead of this webinar ‣ Chat in questions/comments to all panelists at any time ‣ Contact us at pda@ccsi.org

  5. Elements of a Performance Driven Organization Developed by CCSI’s Center for Collaboration in Community Health

  6. Elements of a Performance Driven Organization Developed by CCSI’s Center for Collaboration in Community Health

  7. 1. RCM & Financial Best 3. Contracting Practices & Negotiation Part 2: Leadership Practices to Support Change 2. Corporate compliance, security, &privacy 4. In-person sessions

  8. Assessing Corporate Compliance, HIPAA Privacy and Security June Crawford – Principal, Compliance Solutions, The Bonadio Group

  9. Background of Today’s Speaker June Crawford, RN, BSOM, CHC, CHPC, RAC-CT Principal, The Bonadio Group; jcrawford@bonadio.com ‣ Over 30 years experience in healthcare and human service settings ‣ Healthcare Consultant for 16 years; certified in Healthcare Compliance and Healthcare Privacy Compliance ‣ Former Compliance Officer and HIPAA Privacy Officer ‣ Experienced in risk assessments, policy development and process implementation

  10. Learning Objectives ‣ Identify the elements of an effective Corporate Compliance Program ‣ Explore methods to evaluate the effectiveness of your Corporate Compliance Program ‣ Learn how to incorporate HIPAA Risk Assessment into your Corporate Compliance Program ‣ Learn how to incorporate results into an Annual Compliance Work Plan

  11. HIPAA Risk Assessment ‣ HIPAA Security Rule: All e-PHI created, received, maintained or transmitted by an organization is subject to the Security Rule. ‣ A risk analysis is a requirement (§ 164.308(a)(1)(ii)(A) ). “ Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information (ePHI) held by the organization. ‣ HHS Office of Civil Rights: “Conducting a risk analysis is the first step in identifying and implementing safeguards that comply with and carry out the standards and implementation specifications in the Security Rule.” ‣ “A risk analysis is foundational: The Rule requires entities to evaluate risks and vulnerabilities in their environments and to implement reasonable and appropriate security measures to protect against reasonably anticipated threats or hazards to the security or integrity of e-PHI.”

  12. HIPAA Risk Assessment ‣ OCR Guidance: “ The risk analysis process should be ongoing. In order for an entity to update and document its security measures “as needed,” which the Rule requires, it should conduct continuous risk analysis to identify when updates are needed. (45 C.F.R. §§ 164.306(e) and 164.316(b)(2)(iii).)” ‣ “ The Security Rule does not specify how frequently to perform risk analysis as part of a comprehensive risk management process. The frequency of performance will vary among covered entities. Some covered entities may perform these processes annually or as needed (e.g., bi-annual or every 3 years) depending on circumstances of their environment.”

  13. HIPAA Risk Assessment HIPAA Privacy Assessment should address the following: • Privacy & Confidentiality • Notice of Privacy Practices • Policies and Procedures • Marketing/Fundraising/Sale of PHI • Minimum necessary Rule • Decedents • Research Authorizations • Disclosures • Workforce/Employee Training • Access to PHI • HIPAACompliance in Front and Back Office, and by Providers • Business Associate contracting activities and BA Agreements in use

  14. HIPAA Security Risk Assessment Resources: U.S. Department of Health and Human Services (HHS) and The Office of the National Coordinator for Health Information Technology (ONC) developed a tool and guidance: ‣ Security Risk Assessment (SRA) Tool available at https://www.healthit.gov/topic/privacy-security/security-risk-assessment-tool

  15. Corporate Compliance 101

  16. Corporate Compliance On an organizational level: ‣ Long term commitment to conduct business in ways that promote doing the right things ‣ Continually monitoring that the right things are being done ‣ Responding to changes and problems that are identified along the way

  17. History of Corporate Compliance  1997: Clinical laboratories have model compliance plans in place  1998: Hospitals, Home Health Agencies, Third Party Billers follow suit  1999: Durable Medical Equipment, Hospice, and Skilled Nursing Facilities get on board  1996: HIPAA  2005-06: Deficit Reduction Act  2009- NY Social Service Law 363-d- OMIG  2013: Affordable Care Act – Nursing Homes

  18. Compliance Program Applicability Every required provider shall adopt and implement an effective compliance program…Required providers’ compliance programs shall be applicable to: ‣ Billings ‣ Payments ‣ Medical necessity and quality of care ‣ Governance ‣ Mandatory reporting ‣ Credentialing ‣ Other risk areas that are or should with due diligence be identified by the provider” 18 NYCRR Part 521

  19. Eight Elements of a Compliance Program  Written Policies and Procedures / Code of Conduct  Compliance Program Oversight  Training and Education  Effective, Confidential Communications  Enforcement of Compliance Standards  Auditing and Monitoring  Responding to Offenses and Developing a Corrective Action Plan  Policy of Non-retaliation and Non-intimidation

  20. OMIG Compliance Program Guidance ‣ Issued October 2016; available on OMIG website: www.omig.ny.gov • Provides detailed guidance in each of eight required elements ‣ OMIG Compliance Program Self-Assessment Form; tool available on OMIG website: www.omig.ny.gov • Allows for self-evaluation in each of eight required elements • Evaluator records specific citations to policies, documents

  21. #1 Policies and Procedures Best Practices  Publication of code of conduct and/or Compliance Plan document on the agency’s intranet and/or web site.  Compliance Plan document outlines the benefits of a Corporate Compliance Program as a way to obtain buy-in.  Code of conduct is reviewed annually with employees, contractors and governing body as part of ongoing compliance education.

  22. #2 Compliance Program Oversight Best Practices  The Compliance Officer reports directly to the governing board, with dotted line responsibility to a member of senior management.  The CEO receives regular reports from the Compliance Officer if the Compliance Officer does not report directly to the CEO.  Compliance Committee membership includes governing body.  Privacy Officer and Security Officer participate in Committee meetings.  Compliance Committee meets monthly, bi-monthly.

  23. #3 Education Best Practices  Use of an electronic training and education system that tracks mandatory compliance education of employees; notifies of due dates.  The compliance training materials are tailored to the needs of all levels and the educational backgrounds of all employees.  The compliance manual/code of conduct is distributed upon hire and annually.  Regular compliance-related information/education – newsletters; e-blasts, Compliance & Ethics week.

  24. #4 Effective, Confidential Communication Best Practices  The compliance program operates in an environment of transparency throughout all levels of the organization.  Clients/service recipients receive information on how to identify Medicaid fraud and how any concerns can be reported to management.  Provider uses posters/flyers about the Compliance Program and the hotline that uses pictures as well as text to communicate the expectation that if you see or hear anything, you should report it.

  25. #5 Enforcement Best Practices  Employee performance evaluations incorporate compliance as one indicator of performance, as well as an employee’s adherence to applicable laws, regulations, and policies.  Discipline policies, employee handbook references Compliance Program.

  26. #6 Auditing and Monitoring Best Practices  Use of a comprehensive self-assessment tool to plan and develop an annual Compliance Work Plan.  Internal monitoring and auditing systems are used throughout the organization.  A pre-claim review process is used prior to submission of claims.  A Compliance Program assessment is undertaken prior to the December certification period to identify potential Compliance Program gaps. Results are shared with governing body.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend